Podcast Episodes
Back to SearchD2DO270: Spacelift Is Your Infrastructure Glue (Sponsored)
Working with multiple Infrastructure as Code (IAC) tools can be painful. Spacelift provides a platform that operates on top of disparate IaC tools, i…
1 year ago
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss For…
1 year ago
NB523: CVE’s Reprieve, Google WAN For Sale, NVIDIA Pledges More US-Made Chips
Take a Network Break! We start with a red alert for the CVE program, which nearly lost government funding before CISA stepped in, and then raise an a…
1 year ago
TNO025: Know the Packet Flow
Knowing the flow of how a packet gets from one end to the other is one of the most important pieces of advice given by today’s guest, Mark Prosser. H…
1 year ago
HN777: Overlay All the Things?
Today’s Heavy Networking is all about overlay technologies, their history, development, and current state, both from engineer and vendor perspectives…
1 year ago
N4N022: SNMP Fundamentals
Following last week’s introduction to network monitoring, we discuss the Simple Network Management Protocol (SNMP), one of the most implemented types…
1 year ago
D2DO269: Intergalactic Dataspeak and Making Data Actionable
Data and what you do with it is the topic of today’s show with guest Dominic Chapman, the Head of Product at Axiom. Dominic’s career focus is on data…
1 year ago
PP058: Network Discovery with NMAP: You’ve Got Swaptions
We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the differe…
1 year ago
NB522: Git Turns 20, An iPhone Airlift, Cybersec Silence Speaks Volumes
Take a Network Break! Guest co-host Ned Bellavance steps in for Johna this week. We start with a Fortinet vulnerability, and then opine on a memo fro…
1 year ago
HN776: Security Platforms: Balancing Efficacy, Ops, and Emerging Threats (Sponsored)
Network security has evolved from stateful perimeter firewalls with maybe some IDS/IPS to a complex stack delivered as numerous unique tools, which o…
1 year ago